With automatic Wi-Fi connectivity enabled, your phone will connect to any known network or SSID that doesn’t require a password. You might be at risk if these Wi-Fi connections are monitored by untrusted third-parties. Configure your mobile devices to forget networks you no longer need, or just turn off Wi-Fi entirely.
Phone and tablet software should be vetted by approval teams to ensure their quality and security. Such processes are routine on official app stores, but cannot be assured with third-party sources. Accordingly, steer clear of unofficial storefronts or sideloaded apps from websites.
It’s not as popular as it was in the early 2010s, but jailbreaking (or rooting) a mobile device is still a risky practice. It removes many built-in protections and allows the installation of unapproved applications. Stick with the standard OS and keep it updated.
What if you left your phone behind in a public place? Without a passcode on the lock screen, its contents would be fully accessible to anyone who had it. Configure a passcode, along with other even more secure options such as a fingerprint or facial recognition scan, if available on your device.
Have you ever wondered if someone was secretly listening to your conversations? Many mobile apps, including hundreds of popular games, do exactly that, by scanning for ambient audio cues to better target their advertisements. For your own privacy, consider disabling microphone access for such applications unless you’re actively using it in them.
Don’t panic – follow these best practices after a hack and you can protect yourself.
Privacy /
Legal
Cookie Policy
Do Not Sell My Information
Copyright ©2025 Total Defense LLC. All Rights Reserved.
At Total Defense we take your privacy seriously. We recently made updates to our privacy policy to comply with the European Union’s General Data Privacy Regulation. This policy explains:
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.